
Guru
Work experience
IT-Harvest
Chief Research Analyst
(
-
Present
)
saf ai Inc
Advisory Board Member
(
-
)
..see more
Quick Heal
Board Member
(
-
Present
)
Anitian
Member of Board of Directors
(
-
Present
)
Phosphorus Cybersecurity
Member of Advisory Board
(
-
Present
)
Areas of Expertise
About
United States
Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 4,070+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 32 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar. His research appears on Substack. Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a B.S. in Aerospace Engineering from the University of Michigan, and his MA in War in the Modern World from King’s College, London. His latest book Security Yearbook 2025 was published by Wiley in April, 2025.
...see more
Analysts with similar expertise

Aparna Sundararajan
Strategic Advisor - Secure AI at Rain Consulting Services

Alejandro Leal
Senior Analyst at KuppingerCole Analysts

Evgeniy Kharam
Founder at EK Cyber and Media Consulting
Read Salvador Technologies: The Art of Cyber Attack Recovery

Security
Salvador Technologies: The Art of Cyber Attack Recovery
1 min
Read TrustArc: The Evolution of Privacy Laws

Security
TrustArc: The Evolution of Privacy Laws
1 min
Read Hadrian: Continuous Threat Exposure Management as a Way to Benchmark CISO Success

Security
Hadrian: Continuous Threat Exposure Management as a Way to Benchmark CISO Success
1 min
Read Portworx: Solving Developer Productivity Challenges

Security
Portworx: Solving Developer Productivity Challenges
1 min
Read Rapid7: Scaling Cybersecurity Into a Business Process

Security
Rapid7: Scaling Cybersecurity Into a Business Process
1 min
Read BlackFog: DLP is Dead - Long Live Data Exfiltration!

Security
BlackFog: DLP is Dead - Long Live Data Exfiltration!
1 min
Read TrustArc: Effectively Managing Third-Party Risk

Security
TrustArc: Effectively Managing Third-Party Risk
1 min
Read Blumira: Difficulties SMEs Face with Cybersecurity

Security
Blumira: Difficulties SMEs Face with Cybersecurity
1 min
Read Workiva: Assessing ESG in Your GRC Strategy is Critical

Security
Workiva: Assessing ESG in Your GRC Strategy is Critical
1 min
Read Workiva: Balancing the Demands of GRC and ESG

Security
Workiva: Balancing the Demands of GRC and ESG
1 min
Read Radware: Understanding Supply Chain Attacks and Client Side Protection

Security
Radware: Understanding Supply Chain Attacks and Client Side Protection
1 min
Read Hyperproof: The Truth Behind Automating Compliance Controls

AI
Hyperproof: The Truth Behind Automating Compliance Controls
1 min